Table of Contents: Securing Critical Infrastructure with Memory Safety in Software The issue at hand: memory vulnerabilities The challenge of transitioning to memory-safe languages Current efforts and the role of memory protections The urgency of the matter: threats...
Table of Contents: A Bridge to Memory Safety: Leveraging Load-time Function Randomization for Immediate Protection and Liability Shift Addressing Critical Infrastructure Vulnerabilities: Insights and Recommended Actions Advancing Memory Safety Measures Mitigating...
Table of Contents: How Does 5G Impact National Security? Securing the 5G Global Network DoD’s Response to 5G Security Will There Be a National 5G Network? Protecting 5G Networks Watch the 5G Bash at CyberWeek 2020 RunSafe Security hosted a 5G Cyber Bash webinar...
Table of Contents: New Survey Results: Cyber Decision Makers Are Unaware about the State of Firmware Security Are Cyber Risk Decision Makers Truly Informed? What Tools Are Available to Fill Cyber Knowledge Gaps? The software world continues to undergo dramatic...
Paul Rosenzweig recently made an appearance on the Lessons from the School of Cyber Hard Knocks podcast to discuss his current work, his theories of trust, 5G network technologies, and the importance of cybersecurity metrics with RunSafe’s CEO Joe Saunders. Currently,...
Cloud providers provide network and infrastructure, here is a way for you to protect the software and cloud workloads across all your cloud [and hybrid] environments Shift Left for Shared Cloud Security Cloud deployments introduce major new shared security...